asp

Results 1 - 25 of 486Sort Results By: Published Date | Title | Company Name
Published By: Group M_IBM Q418     Published Date: Oct 24, 2018
Evaluating cloud providers and looking for a trusted technology partner? Focus on these five vital aspects of cloud security.
Tags : 
    
Group M_IBM Q418
Published By: Uberall     Published Date: Oct 08, 2018
Your store locator is a critical component on your website; it’s the moment of truth when an online shopper becomes and offline customer. And while it may seem like a simple tool, there are several key factors that will transform the user experience from functional to best-in-class. See how you can optimize this key aspect of your customer journey.
Tags : 
store, locator, experience, optimize, local marketing, customer journey
    
Uberall
Published By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Multinational companies (MNCs) are facing a unique combination of escalating customer, competitive and operational pressures which are forcing them to fundamentally change the way they do business and manage their IT infrastructures supporting network, security and mobility needs. Lack of IT resources, limited capex and more complex global implementations are driving an increasing proportion of MNCs to offload, or 'out-task', various aspects of their day-to-day management responsibilities to skilled third-parties that can help perform these functions well.
Tags : 
health, global management service, cloud services, technology
    
Virtela Communications, Inc.
Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner
    
Ounce Labs, an IBM Company
Published By: Cylance     Published Date: Jul 02, 2018
Cylance commissioned AV-TEST to perform an advanced threat prevention test of enterprise endpoint protection software. The testing methodology was jointly developed to provide additive testing to the commodity antivirus protection tests currently produced by AV-TEST. CylancePROTECT® was tested against five competitor endpoint products from Kaspersky, McAfee, Sophos, Symantec, and Trend Micro. The tests were performed in December 2016 and January 2017. This report contains the results of four test cases. The primary goal was to show the detection and prevention capabilities of new and unknown malicious executables. Read more in the AV-TEST report.
Tags : 
cyber, threat, protection, av-test, cylance
    
Cylance
Published By: Cylance     Published Date: Jul 02, 2018
Matthew Coy, Safelite’s Vice President of Information Technology, is responsible for overseeing all aspects of the company’s IT infrastructure, including selecting, administering, and supporting technology products. The company handles personally identifiable information, including credit card information and insurance data collected from several sources, and must comply with insurance industry regulations and the Payment Card Industry Data Security Standard. Safelite is the target of constant external attacks. The organization experienced ongoing security issues stemming from infected software, drivebys and other malicious downloads. According to Matthew, “A lot of malware and email viruses were making it through the environment, all bypassing our email security and AV.” Not only were the security controls ineffective, the previous AV platform required nearly 150 hours per week to manage. Matthew knew Safelite needed to make a change, and fast. Having worked with Cylance® at two previous companies, he was confident CylancePROTECT® could significantly improve Safelite’s endpoint security. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
safe, lite, cybersecurity, data
    
Cylance
Published By: MissionMode     Published Date: Jun 20, 2012
A new way to streamline crisis management and focus on the key aspects of crisis response.
Tags : 
    
MissionMode
Published By: Akamai Technologies     Published Date: May 24, 2017
Sicherheit und Performance wurden einst als separate Aspekte angesehen, für die ganz unterschiedliche Lösungen erforderlich sein sollten. Cyberkriminelle haben jedoch neue und überaus effektive Möglichkeiten gefunden, die Ihre Website in beiderlei Hinsicht gefährden. Erfolgreiche Lösungen müssen daher Sicherheitslöcher stopfen und parallel die Performance am Frontend optimieren. Wie ist das möglich? In diesem Bericht gehen wir auf browserbasierte Lösungen ein, welche gleichzeitig die Sicherheit optimieren und die Performance für den Endnutzer verbessern. Wir untersuchen verschiedene Techniken für den Umgang mit inhaltsbezogenen Browserproblemen, wie z. B. HSTS, Inlineframe und Prefetching. Der Bericht behandelt zudem Service-Worker- und browserbasierte Skripts, die viele Sicherheits- und Performanceoptionen bieten. Laden Sie den Bericht jetzt herunter und erfahren Sie, wie Sie Sicherheit und Performance gleichermaßen verbessern können.
Tags : 
    
Akamai Technologies
Published By: Cisco EMEA     Published Date: Mar 05, 2018
Miercom was engaged by Cisco Systems to independently configure, operate and assess aspects of campus-scale, wireless and wired network infrastructures from Cisco and Huawei Technolgies. Our evaluation found that, where Cisco and Huawei both offer all the comparable components for building a campus-wide, wireless and wired, network infrastructure, test after test found that the Cisco package offers certain positive advantages that Huawei does not. Cisco showcased superior performance against the Hauwei wireless solution with a highly developed resource management, hardware, software and security platform to provide the most optimized, trustworthy system to ever customer. To find out more download this whitepaper today.
Tags : 
cisco, power, radio, wi-fi, network, architecture
    
Cisco EMEA
Published By: Box     Published Date: Jun 22, 2018
• Content is among an organization's most critical assets. It flows through every aspect of a company, from people to systems to processes. But as teams grow and the breadth of their content expands, these valuable assets get fragmented across the different tools they use. • What if you had a secure, open platform that connects all your tools in the cloud, allowing you to pull together best-of-breed technologies that fit your unique business needs? These native integrations keep teams happy and give IT full visibility and control, while boosting productivity and collaboration across the entire organization. • Download our ebook to see how Cloud Content Management from Box provides you with a central and secure content layer that unites all of your apps with seamless, native integrations. In it, you'll learn about our most popular integrations — like Microsoft Office 365, Okta, Slack and Salesforce — and how Box helps you future-proof your tech stack while also providing a unified exp
Tags : 
    
Box
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
La sécurité est une préoccupation permanente pour les entreprises Le paysage des menaces ne cesse de se développer et les attaques sont de plus en plus complexes. Si les technologies émergentes telles que l'Internet des objets (IoT), la mobilité et les environnements informatiques hybrides font apparaître de nouvelles opportunités commerciales, elles introduisent également de nouveaux types de risques. Protéger les serveurs au niveau logiciel n'est plus suffisant ; pour garder un temps d'avance sur les menaces, les entreprises doivent se protéger au niveau des systèmes physiques. Avec la multiplication des contraintes réglementaires, la conformité joue un rôle de plus en plus critique à la fois sur l'augmentation de la sécurité et sur la réduction du coût des non-conformités. Ces différents aspects étant extrêmement critiques, il est très important de définir des niveaux de protection matérielle et d'appliquer les mesures de sécurité jusqu'à la chaîne d’approvisionnement. À cet effet,
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Das Thema Sicherheit droht, sich für Unternehmen zum Problem zu entwickeln. Die Zahl der Sicherheitsbedrohungen nimmt zu und die Angriffe werden immer raffinierter. Neue Technologien wie das IoT, mobile Lösungen und Hybrid IT-Umgebungen bieten zwar neue Geschäftschancen, bringen aber auch neue Risiken mit sich. Heutzutage reicht es daher nicht mehr aus, die Server auf Softwareebene zu schützen. Unternehmen müssen den Schutz bis auf die physischen Systeme ausweiten, um gegen Sicherheitsbedrohungen gewappnet zu sein. Angesichts der immer größeren Zahl an regulatorischen Bestimmungen im heutigen Geschäftsumfeld gewinnt die Einhaltung dieser Bestimmungen an Bedeutung – zum einen, um das Sicherheitsniveau zu verbessern, zum anderen, um die Kosten zu senken, die durch die Nichteinhaltung dieser Bestimmungen entstehen. Da diese Aspekte von so kritischer Bedeutung sind, ist es wichtig, den Schutz der Hardware zu verbessern und das Sicherheitsniveau bis auf Lieferkettenebene zu erhöhen.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Die digitale Transformation ist für mittelständische Unternehmen (100 bis 999 Mitarbeiter) ein absolutes Muss, um im digitalen Umfeld erfolgreich zu sein. Durch eine digitale Transformation können sich Unternehmen mehr Wettbewerbsvorteile verschaffen, indem sie Geschäftsprozesse automatisieren, operative Abläufe effizienter gestalten, Kundenbeziehungen vertiefen und neue Umsatzströme durch Produkte und Services generieren, die auf modernsten Technologien basieren. Die digitale Transformation kann durchaus als Reise gesehen werden, die damit beginnt, dass Unternehmen eine IT-basierte Vision entwickeln. Diese führt dann zu einer datenorientierten Strategie, bei der Analysen im Mittelpunkt stehen. Das Ergebnis solcher Initiativen hängt von der Fähigkeit des Unternehmens ab, Menschen, Prozesse, Plattformen und den Aspekt Governance effizient zu nutzen, um die Geschäftsziele des Unternehmens zu erreichen.
Tags : 
    
Hewlett Packard Enterprise
Published By: Cisco EMEA     Published Date: Dec 11, 2018
Miercom was engaged by Cisco Systems to independently configure, operate and assess aspects of campus-scale, wireless and wired network infrastructures from Cisco and Huawei Technolgies. Our evaluation found that, where Cisco and Huawei both offer all the comparable components for building a campus-wide, wireless and wired, network infrastructure, test after test found that the Cisco package offers certain positive advantages that Huawei does not. Cisco showcased superior performance against the Hauwei wireless solution with a highly developed resource management, hardware, software and security platform to provide the most optimized, trustworthy system to ever customer. To find out more download this whitepaper today.
Tags : 
    
Cisco EMEA
Published By: Akamai Technologies     Published Date: May 05, 2017
Security and performance were once considered separate issues requiring very different solutions. But now that malicious hackers have discovered new and better ways to affect both aspects of a website, you need solutions that can plug security holes while enhancing frontend performance. How is that possible? In this report, we explore browser-based solutions that can beef up security and enhance end-user performance in one stroke. This report examines several techniques for dealing with third party content issues in the browser, including HSTS, iframe, and prefetch. It also dives into service workers and browser-based scripts that provide many security and performance options. Download it now and learn how you can jointly improve security and increase performance.
Tags : 
cyber security, security, web linking, performance
    
Akamai Technologies
Published By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. It’s often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a company’s most valuable data even while it’s potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015. However, only half of enterprises today are using some type of endpoint backup. That means that the volume of endpoint data that is in jeopardy is nothing short of significant. Download to read the buyer's checklist on endpoint data protection!
Tags : 
commvault, endpoint data protection, endpoint data, data protection, backup, encryption, data loss prevention, mobile app, networking, security, it management, knowledge management, enterprise applications, storage, data management
    
Commvault
Published By: Cisco     Published Date: Feb 23, 2016
Mobile devices have brought advancements to virtually all aspects of modern life and have had transformative effects on businesses spanning all industries. However, the positive business effects that can be brought about by mobility and "going digital" are not enjoyed as frequently within small and midsize businesses (SMBs) as they are within larger organizations. While potential benefits are there, small and midmarket organizations may have fewer resources available and can find difficulty in realizing the full value of the enterprise mobility infrastructure. Often, organizations find themselves having to make trade-offs between richness of functionality and available resources.
Tags : 
wireless management, wireless, communications, business practices
    
Cisco
Published By: Cisco     Published Date: Feb 23, 2016
As security continues to get more complex Cisco looks at a network visually for secuirty aspects and is not based upon classifications of boundary and segmentation. Putting the 'Network' back in Network Security is an implementation used through: Netflow, Fire & ISE, Beyond Access Control (SGT & TrustSec)
Tags : 
network management, network secuirty, network optimization, networking, security
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
Mobile devices have brought advancements to virtually all aspects of modern life and have had transformative effects on businesses spanning all industries. However, the positive business effects that can be brought about by mobility and "going digital" are not enjoyed as frequently within small and midsize businesses (SMBs) as they are within larger organizations. While potential benefits are there, small and midmarket organizations may have fewer resources available and can find difficulty in realizing the full value of the enterprise mobility infrastructure. Often, organizations find themselves having to make trade-offs between richness of functionality and available resources.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
Mobile devices have brought advancements to virtually all aspects of modern life and have had transformative effects on businesses spanning all industries. However, the positive business effects that can be brought about by mobility and "going digital" are not enjoyed as frequently within small and midsize businesses (SMBs) as they are within larger organizations. While potential benefits are there, small and midmarket organizations may have fewer resources available and can find difficulty in realizing the full value of the enterprise mobility infrastructure. Often, organizations find themselves having to make trade-offs between richness of functionality and available resources.
Tags : 
    
Cisco
Published By: F5 Networks Inc     Published Date: Dec 08, 2017
There’s a reason why web application firewalls have been getting so much attention lately. It’s the same reason we keep hearing about major security and data breaches left, right, and center. Web application security is difficult—very difficult.
Tags : 
owasp, web application safety, data breaches, firewalls
    
F5 Networks Inc
Published By: Dell     Published Date: May 04, 2018
Digital transformation has become a business imperative as most aspects of economic engagement have become digital. Around the globe, businesses and government agencies are re-engineering their technology infrastructures to keep pace with customer demands, spur innovation and stay competitive in an ever-evolving digital economy. Dell EMC provides a tightly integrated software ecosystem and the flexibility to run multiple workload types, providing solutions to a broader customer base than HPE.
Tags : 
    
Dell
Published By: Adobe     Published Date: Dec 07, 2017
Whether you’re a creative professional or an aspiring artist, everyone is influenced by trends. You can change them, challenge them, be inspired by them. But you can’t ignore them. Trends encourage artists to master age-old techniques and push new boundaries. As award-winning designer Paul Trani puts it, “A new design trend is no different than a new invention—inventions either make something better or reveal a need we didn’t know we had.” Download this whitepaper to take a look at current visual trends to see what’s making noise in the creative community.
Tags : 
    
Adobe
Published By: DocuSign UK     Published Date: Nov 06, 2018
"With every week that passes, our dependency on paper wanes as digital processes are introduced into every aspect of our daily activity. If you want to sign a contract, book a restaurant or make a bank transfer, you can do so digitally – it is ingrained in our lives. Taking an entire business digital can be more challenging and reliant on many more moving parts. Identifying how businesses are evolving to meet these rapidly changing demands is essential for decision makers across all sectors of the economy to prepare their organisation or department accordingly to undertake successful digital transformations. This eBook investigates digital expectations from both the consumer and business perspectives. It identifies what action is being taken to meet the demand in the market and where the main challenges lie for businesses that are trying to deliver the digital experience their customers want."
Tags : 
    
DocuSign UK
Published By: DocuSign UK     Published Date: Nov 06, 2018
"Every organisation already has a system of agreement. It's how written agreements get prepared, signed, enacted, and managed. But typically, it involves a messy, improvised mix of printing, signing, scanning, faxing, and overnighting paper agreements. These needlessly slow legacy processes add costs to agreements due to wasted productivity and materials. It's time for a change. The DocuSign System of Agreement Platform connects the world's No. 1 eSignature technology to every other aspect of the agreement process. Read this white paper to learn how to modernise your System of Agreement, including how to: - Prepare agreements with a high degree of automation - Sign agreements quickly and securely - Act on agreement terms after signing - Manage agreements with flexible options"
Tags : 
    
DocuSign UK
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.